your packets are encrypted until they reach the exit node, nobody can see your ip address, the exit node will see the sites you visit and even your passwords, posts etc. if the site is not encrypted, the visited sites will see the exit node's ip address

if you use a simple http connection, the exit nodes can read your packets with wireshark or other tools, there are middle man and statistical attacks too, but difficult to deploy, the feds probably use it
make sure you disable javascript in firefox options and block all scripts with noscript, the visited site maybe will see your real ip if you use javascript, you are safe if you use it with caution, just think about all the sht that you can find in torland

doesnt tor already change the js settings so its safe and anonymous tho?
thats what the faq says. i rly don't want to disable js

Click to expand...

if you don't do it you're probably gonna leak a wealth of info you don't really want to give away if privacy is your main concern... With https everywhere a few attacks on tor, as noted above, while possible are fairly "complicated" to accomplish in real life and for the most part not in your average skid skillset...

if you don't do it you're probably gonna leak a wealth of info you don't really want to give away if privacy is your main concern... With https everywhere a few attacks on tor, as noted above, while possible are fairly "complicated" to accomplish in real life and for the most part not in your average skid skillset...

Click to expand...

privacy isnt really my main concern btw anonymity is
its not like i put credit card # w/ tor.
do u guys know the details to which js was fixed w/ the newest tor bundle ver.?
and if its safe to use the default torbutton settings?

Note that adblockers might block our captcha, and other functionality on BHW so if you don't see the captcha or see reduced functionality please disable adblockers to ensure full functionality, note we only allow relevant management verified ads on BHW.